Back to Search Begin New Search Save Search Auto-Notify
Tenable Operational Technology Security Demo
This on-demand demo showcased how Tenable OT Security delivers complete visibility into an organization’s converged IT/OT infrastructure to help maximize the safety and security of your OT environment. Our Tenable OT Demo covered the following: Comprehensive visibility across converged IT/OT operations. Risk reduction through multiple threat detection methodologies. IT and OT asset identification and monitoring with Tenable OT Security....
Add Favorite
Secure Your Python and AI/ML/DS Softwar...
As the adoption of artificial intelligence, machine learning and data science (AI/ML/DS) continues to grow, the security of open-source software, especially Python, has never been more important. Anaconda experts hosted a webinar on September 20, 2023 and explored the challenges and risks associated with open-source, cover the essentials of software supply chain security and discover best practices for mitigating open-source risks. During this...
Add Favorite
Federal Policy for Supply Chains What's...
Executive branch policies and Congressional legislation indicate a growing priority for "whole of nation" supply chain resilience. Continuous supply chain monitoring & risk analysis is not just mandated, it's proving to be a critical & necessary strategic deterrent. Federal supply chain policy (Section 8...81) was established to minimize risk in information and communications. Congress is now proposing draft legislation to expand poli...
Add Favorite
Creating A Capture Plan And Ask-Me-Anyt...
Creating A Capture Plan And Ask-Me-Anything, Government Contracting Open Lab REGISTER HEREhttps://www.govassociation.org/event-5428132 Classes are awesome, but Labs are even better. Come join us weekly as we train and prepare you to capture government contracts. These Lab sessions are designed to prepare CCM students with the hands-on support through your government contracting journey. Also, these labs sessions are open to all GCA members, pa...
Add Favorite
Results from Four Years of GNSS Interfe...
An overview of the University of Texas at Austin Radionavigation Laboratory use of a specialized GPS receiver on the International Space Station to detect and locate GPS jammers and spoofers causing trouble around the world.
Add Favorite
Transforming Government's Digital Prese...
In the realm of government, a seamless and impactful digital presence is no longer a luxury—it's a necessity. Attendees joined us discover the strategic alliance of Acquia and Amazon Web Services (AWS) emerging as a potent force that empowers federal, state, and local government agencies to elevate their online engagement and service delivery. During this on-demand session, we will delved into the intricacies of our partnership, explorin...
Add Favorite
Attack Surface Management and Threat In...
Join Google Cloud to learn how Public Sector organization's attack surfaces are constantly expanding and evolving. cloud resources, unmanaged assets, code repositories — all internet facing assets have the potential to be exploited if there is an unmitigated vulnerability, misconfiguration, or exposure. This is where threat intelligence provides a valuable role to help you and your teams prioritize what needs attention and why. Durin...
Add Favorite
Cyber Resilience 2023 - Two Day Virtual...
Ever since the dawn of the internet, its usefulness lies in the data it handles, whether moving it, storing it, or calculating with it. As a result, just as Willie Horton once said he robbed banks because “that’s where the money is,” many of today’s cyber bad actors target agencies’ data because they can monetize it. As a result, cybersecurity is akin to the 20th century Cold War. On the one hand, bad actors ...
Add Favorite
Protect Your Government Agency's Data a...
Modernizing applications and migrating to public cloud platforms enhance agility and flexibility. But there are also trade-offs to consider, including new and borderless attack surfaces, lack of consistent visibility, and growing tool sprawl and tool expenses. Together, Gigamon and Sumo Logic enable organizations to build an effective and efficient monitoring and security posture that surfaces a level of understanding unattainable beforehand....
Add Favorite
DoDIIS Worldwide Webinar Series: Securi...
Babel Street and Carahsoft are excited to invite you to join us in the lead up to DoDIIS 2023 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. In today's digital landscape, organizations and government agencies face a growing threat from insider risks, which can have far-reaching consequences for reputation, business continuity, loss of life, and national securi...
Add Favorite
Back to Search Begin New Search